The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott –...

49
The Social The Social Context of Context of Computing Computing Group 1 Group 1
  • date post

    15-Jan-2016
  • Category

    Documents

  • view

    218
  • download

    0

Transcript of The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott –...

Page 1: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

The Social Context of The Social Context of Computing Computing

Group 1Group 1

Page 2: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

The Social Context of Computing The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computingKyle Lippencott – Introduction to the Social Implications of computing

Laura Thurber – Social Implications of Networked CommunicationsLaura Thurber – Social Implications of Networked Communications

Douglas Camin – Growth of, Control of and Access to the InternetDouglas Camin – Growth of, Control of and Access to the Internet

Christopher Conway – Gender related Issues of ComputingChristopher Conway – Gender related Issues of Computing

Matthew Dietz – International IssuesMatthew Dietz – International Issues

Robert Host – Computer CrimeRobert Host – Computer Crime

Page 3: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Social Implications of Social Implications of ComputingComputingBy: Kyle LippincottBy: Kyle Lippincott

Page 4: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Primary IssuesPrimary Issues

Interpersonal RelationsInterpersonal Relations Privacy and AnonymityPrivacy and Anonymity Segregation and StereotypingSegregation and Stereotyping Education and WorkEducation and Work ReliabilityReliability

Page 5: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Interpersonal RelationsInterpersonal Relations

Always-OnAlways-On Cell PhonesCell Phones EmailEmail Instant MessagingInstant Messaging

EfficientEfficient ImpersonalImpersonal

Page 6: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Privacy and AnonymityPrivacy and Anonymity

Data MiningData Mining Identifiable TrailsIdentifiable Trails

Cookies/HistoryCookies/History Email Inbox/Chat LogsEmail Inbox/Chat Logs

Unique Identifiers and Alternate IdentitiesUnique Identifiers and Alternate Identities Anonymizer ServicesAnonymizer Services Information/Identity TheftInformation/Identity Theft

Page 7: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Segregation and StereotypingSegregation and Stereotyping

Digital DivideDigital Divide StereotypingStereotyping

GenderGender RaceRace Social ClassSocial Class ElitismElitism CliquesCliques

Page 8: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Education and WorkEducation and Work

Computers in the ClassroomComputers in the Classroom Student AttentionStudent Attention Access ControlAccess Control

Changes in WorkflowChanges in Workflow Digital MeetingsDigital Meetings

Page 9: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

ReliabilityReliability

Physical ReliabilityPhysical Reliability Always-OnAlways-On

Alwayson=!You.place.equals(bing);Alwayson=!You.place.equals(bing); UptimeUptime

Data IntegrityData Integrity Compromised DataCompromised Data Flawed ProgrammingFlawed Programming

Page 10: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Social Implications of Social Implications of Networked Networked

Communications Communications By: Laura ThurberBy: Laura Thurber

Page 11: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Social Implications of Networked Social Implications of Networked ComputingComputing

The everyday effect of networks on our livesThe everyday effect of networks on our lives BenefitsBenefits MisusesMisuses What values has society adopted from this What values has society adopted from this

widespread internet culture?widespread internet culture? The social impact of these networks has The social impact of these networks has

changed our lives to a degree probably changed our lives to a degree probably unimagined 10 or 15 years ago.unimagined 10 or 15 years ago.

Page 12: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Benefits of NetworksBenefits of Networks

What can networks do for the average user?What can networks do for the average user? -The normal stuff-The normal stuff

ChattingChatting EmailEmail Simple research, i.e. News, health, gamesSimple research, i.e. News, health, games

Page 13: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

However...However...

There are other uses for a networkThere are other uses for a network The Center for Children and Technology and The Center for Children and Technology and

Lexington School for the DeafLexington School for the Deaf Using a network for basic communicationUsing a network for basic communication

Chatting to perform lessonsChatting to perform lessons Improve basic language skillsImprove basic language skills Dramatic improvement in communication and Dramatic improvement in communication and

understandingunderstanding Classes became much more fun!Classes became much more fun!

Page 14: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

The ProblemsThe Problems

However, networks can also create problemsHowever, networks can also create problems Viruses, worms, trojansViruses, worms, trojans Scams and hoaxesScams and hoaxes

The Good Times “virus”The Good Times “virus” Threatened to erase all files on the computer, scare the dog, kill Threatened to erase all files on the computer, scare the dog, kill

the cat, overheat the stove, and turn off the freezer so that your the cat, overheat the stove, and turn off the freezer so that your ice cream goes all melty.ice cream goes all melty.

Physically impossible to executePhysically impossible to execute Nevertheless captured the imagination/attention of the nationNevertheless captured the imagination/attention of the nation Major companies shut down – AT&T, NASA, DoD, FCC, TIMajor companies shut down – AT&T, NASA, DoD, FCC, TI The effect it had on the populaceThe effect it had on the populace

Page 15: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

The Overall ImpactThe Overall Impact

The level of integrationThe level of integration SchoolsSchools

Reports typed, online sources encouragedReports typed, online sources encouraged PharmaciesPharmacies

Records no longer accepted in hard copyRecords no longer accepted in hard copy Banks Banks

Moving away from passbook accountsMoving away from passbook accounts Business Offices, Newspapers, dental officesBusiness Offices, Newspapers, dental offices

Page 16: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Have we progressed to dependance?Have we progressed to dependance? Entire industries are spawned from our Entire industries are spawned from our

dependance on these machinesdependance on these machines Interaction accomplished online, rather than in Interaction accomplished online, rather than in

personperson Email, instant messaging and online shopping Email, instant messaging and online shopping

replace standing in line at the grocery storereplace standing in line at the grocery store Good or bad?Good or bad?

Page 17: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Implication: Technology has so changed our Implication: Technology has so changed our lives that it would be difficult to regress, even lives that it would be difficult to regress, even given an impetus to.given an impetus to.

Page 18: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Growth of, Control of Growth of, Control of and Access to the Internet and Access to the Internet

By: Douglass CaminBy: Douglass Camin

Page 19: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Humble Beginnings - 1969Humble Beginnings - 1969

ARPANet: precursor of ARPANet: precursor of today’s Internettoday’s Internet

4 Nodes: 4 Nodes: StanfordStanford UC Santa BarbaraUC Santa Barbara UCLAUCLA University of UtahUniversity of Utah

Sponsored by Sponsored by Department of DefenseDepartment of Defense

The Internet, circa 1969The Internet, circa 1969

Page 20: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Innovations – 1970’sInnovations – 1970’s

15 Nodes (1971) – 188 nodes (1979)15 Nodes (1971) – 188 nodes (1979) First e-mail program created (1971)First e-mail program created (1971) Telnet specification created (1972)Telnet specification created (1972) Ethernet proposal by Metcalfe (1973)Ethernet proposal by Metcalfe (1973) TCP Specification by Cerf and Kahn (1974)TCP Specification by Cerf and Kahn (1974) ARPA established the Internet Configuration Control ARPA established the Internet Configuration Control

Board (ICCB) (1979)Board (ICCB) (1979)

Page 21: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Years of Transition – 1980’sYears of Transition – 1980’s

213 Hosts (1981) – ~159,000 (1989)213 Hosts (1981) – ~159,000 (1989) Phrase “Internet” came to be popularPhrase “Internet” came to be popular DNS created (1984)DNS created (1984) NSF creates five “supercomputing” sites as backbone NSF creates five “supercomputing” sites as backbone

to handle growing load (1986):to handle growing load (1986): Princeton (NJ)Princeton (NJ) Pittsburgh (PA)Pittsburgh (PA) UC – San DiegoUC – San Diego Cornell (NY)Cornell (NY)

Number of new connections grows logarithmicallyNumber of new connections grows logarithmically

Page 22: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

In the Mainstream – 1990’sIn the Mainstream – 1990’s

313,000 hosts (1990) – 56.2 million (1999)313,000 hosts (1990) – 56.2 million (1999) Original ARPANet removed from service and Original ARPANet removed from service and

transferred to NSF (1990)transferred to NSF (1990) First commercial dial-up Internet service: The World First commercial dial-up Internet service: The World

(1990)(1990) NSF increases backbone speed to T3 (44.736Mbps) NSF increases backbone speed to T3 (44.736Mbps)

(1991)(1991) World Wide Web protocols and software released by World Wide Web protocols and software released by

CERN (1991)CERN (1991)

Page 23: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

In the Mainstream (cont) – 1990’sIn the Mainstream (cont) – 1990’s

Government agencies begin to have presence on the Government agencies begin to have presence on the Internet – White House, UN (1993)Internet – White House, UN (1993)

Web browsing becomes an immediate hit with the Web browsing becomes an immediate hit with the release of the Mosaic browser (1993)release of the Mosaic browser (1993)

Businesses begin to see Internet as a viable commerce Businesses begin to see Internet as a viable commerce tool. First web advertisements are served (1994)tool. First web advertisements are served (1994)

NSF turns support of backbone over to private NSF turns support of backbone over to private enterprise (1995)enterprise (1995)

Private commercial dial-up services such as America Private commercial dial-up services such as America Online and CompuServe connect users to the InternetOnline and CompuServe connect users to the Internet

Page 24: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

In the Mainstream (cont) – 1990’sIn the Mainstream (cont) – 1990’s

MCI increases backbone speed from 155Mbps to MCI increases backbone speed from 155Mbps to 622Mbps (1996)622Mbps (1996)

DNS turned over to ICANN, a quasi-private enterpriseDNS turned over to ICANN, a quasi-private enterprise MCI increases backbone capacity again, to 2.5Gbps MCI increases backbone capacity again, to 2.5Gbps

(1999)(1999) ““Internet Mania” takes hold – shaky business plans Internet Mania” takes hold – shaky business plans

lead to rush of technology investment (1999)lead to rush of technology investment (1999)

Page 25: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

New Millennium – 2000’sNew Millennium – 2000’s

Internet mania (or Internet bubble) ends – many Internet mania (or Internet bubble) ends – many online businesses fail (2000-2001)online businesses fail (2000-2001)

Connections of new users to Internet continues to Connections of new users to Internet continues to grow exponentiallygrow exponentially

Many other countries catching the United States in Many other countries catching the United States in terms of percentage of population accessing Internetterms of percentage of population accessing Internet

Page 26: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Security & ControlSecurity & Control

Early security concerns stemmed primarily from intruder Early security concerns stemmed primarily from intruder access (1970’s)access (1970’s)

As network grew, concerns changed to malicious code As network grew, concerns changed to malicious code and viruses (1980’s)and viruses (1980’s)

““Morris” worm spreads and shuts down most of Internet Morris” worm spreads and shuts down most of Internet (1988) – CERT created in response(1988) – CERT created in response

As Internet technology spreads into the mainstream, and As Internet technology spreads into the mainstream, and web pages become prevalent, who can view content web pages become prevalent, who can view content becomes most important (1990’s)becomes most important (1990’s)

Privacy and rights (copyrights) are large issues with Privacy and rights (copyrights) are large issues with advent of high-speed data connections to homes (2000’s)advent of high-speed data connections to homes (2000’s)

Page 27: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Security & ControlSecurity & Control

Some governments imposed more strict limits on users’ Some governments imposed more strict limits on users’ ability to access the Internet:ability to access the Internet: China – All users and service providers must first register with China – All users and service providers must first register with

the governmentthe government Germany – Asked service providers to block content the Germany – Asked service providers to block content the

government deemed offensive to it’s citizensgovernment deemed offensive to it’s citizens France – Asked Yahoo to block objectionable items from France – Asked Yahoo to block objectionable items from

online auction sites it felt violated decency laws.online auction sites it felt violated decency laws.

Page 28: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Sociological ImplicationsSociological Implications

Who has access to the Internet has become an Who has access to the Internet has become an important social issue recentlyimportant social issue recently

Many governments and private enterprises work hard Many governments and private enterprises work hard to provide internet access to poor, rural, or otherwise to provide internet access to poor, rural, or otherwise disadvantaged peopledisadvantaged people

Many social advocates believe the Internet will, over Many social advocates believe the Internet will, over the long term, help foster better communication and the long term, help foster better communication and interconnection between various societies in the worldinterconnection between various societies in the world

Page 29: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Gender Related Issues Gender Related Issues of Computingof ComputingBy: Christopher ConwayBy: Christopher Conway

Page 30: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Decrease in female ParticipationDecrease in female Participation

In 1986, 36% of bachelor degrees were given In 1986, 36% of bachelor degrees were given to females.to females.

In 1996, 27% of bachelor and master’s degrees In 1996, 27% of bachelor and master’s degrees were given to females.were given to females.

Page 31: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

““Pipeline Shrinkage”Pipeline Shrinkage”

The process of a gradual decline in the The process of a gradual decline in the participation of women as they advance along participation of women as they advance along the academic pipeline.the academic pipeline.

3 major factors3 major factors Lack of self esteemLack of self esteem Gender DiscriminationGender Discrimination Balancing of a career and family ResponsibilitiesBalancing of a career and family Responsibilities

Page 32: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Self EsteemSelf Esteem

Study by American Association for the Study by American Association for the Advancement of Science Advancement of Science 30% vs. 15% questioned ability to do work30% vs. 15% questioned ability to do work 27% vs. 12% criticism hard to handle27% vs. 12% criticism hard to handle 30% vs. 57% confident in class30% vs. 57% confident in class 33% vs. 9% fear speaking33% vs. 9% fear speaking

Dealing with Success and FailureDealing with Success and Failure Lack of strategy vs. Lack of competenceLack of strategy vs. Lack of competence Reproductive strategy vs. Constructive strategyReproductive strategy vs. Constructive strategy

Page 33: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Gender DiscriminationGender Discrimination

Patronizing behaviorPatronizing behavior Male dominated preconceptionMale dominated preconception

““The early stereotyping of toys for boys and girls: The early stereotyping of toys for boys and girls: Transformers for boys and Barbie for girls.”Transformers for boys and Barbie for girls.”

Aggressive metaphors in softwareAggressive metaphors in software

Page 34: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Career vs. Family Career vs. Family

Tenure vs. Childbearing Tenure vs. Childbearing Effects males and femalesEffects males and females Possible SolutionsPossible Solutions

Quality childcareQuality childcare Increased amount of time to earn tenureIncreased amount of time to earn tenure

Page 35: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

International IssuesInternational Issues

By: Matthew DietzBy: Matthew Dietz

Page 36: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Digital DivideDigital Divide

Separation of the Rich from the PoorSeparation of the Rich from the Poor Eastern Europe, monopolizing phone Eastern Europe, monopolizing phone

companiescompanies The Internet moves citizens to participate in The Internet moves citizens to participate in

SocietySociety ““Information Poverty”Information Poverty”

2001- less than 25% online lived outside of 2001- less than 25% online lived outside of U.S.U.S.

Page 37: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Non-Western CultureNon-Western Culture

IranIran Requires Internet users to sign waivers agreeing to Requires Internet users to sign waivers agreeing to

not access non-Islamic sitesnot access non-Islamic sites IsraelIsrael

Accepts the internet openlyAccepts the internet openly Uses internet as propaganda toolUses internet as propaganda tool

Middle East Peace ProcessMiddle East Peace Process

Page 38: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Security and PrivacySecurity and Privacy

Computer TerrorismComputer Terrorism NYC BlackoutNYC Blackout

Not caused by a computer, but takes almost nothing to Not caused by a computer, but takes almost nothing to cripple 2 million peoplecripple 2 million people

Raises concern over how easily terrorists could destroy Raises concern over how easily terrorists could destroy communications, banking, or morecommunications, banking, or more

SecuritySecurity IsraelIsrael

Head of Secret Service name revealed publicly in Head of Secret Service name revealed publicly in Washington PostWashington Post

Page 39: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Security and Privacy Cont…Security and Privacy Cont…

Ban on encryptionBan on encryption U.S. bans export of encryption strong than 40 bitU.S. bans export of encryption strong than 40 bit

International fears of secret information being cracked International fears of secret information being cracked using own productsusing own products

Causes other nations to question usefulness vs Causes other nations to question usefulness vs security concernssecurity concerns

Total dependence on computers, likely a weakness?Total dependence on computers, likely a weakness?

Page 40: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

H1-B and L-1H1-B and L-1

VisasVisas Allow the import of foreign workers and Allow the import of foreign workers and

executivesexecutives Cheaper labor, often equally skilledCheaper labor, often equally skilled Workers often paid significantly lessWorkers often paid significantly less Factor in many developed nations, not just U.S.Factor in many developed nations, not just U.S. Some lose jobs, but others able to feed and clothe Some lose jobs, but others able to feed and clothe

familiesfamilies Raises many moral issuesRaises many moral issues 1999 – 40% of foreign visa workers to fill computer-1999 – 40% of foreign visa workers to fill computer-

related positionsrelated positions

Page 41: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

OutsourcingOutsourcing

Act of sending workload of common practices Act of sending workload of common practices to other, often cheaper companiesto other, often cheaper companies India primary receiver of outsourced laborIndia primary receiver of outsourced labor Beneficial to some, detrimental to others.Beneficial to some, detrimental to others. IndiaIndia

Some make as little as $11,000/yrSome make as little as $11,000/yr Actually 22 times more than average salary in IndiaActually 22 times more than average salary in India

Page 42: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Outsourcing cont…Outsourcing cont…

Page 43: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Outsourcing cont…Outsourcing cont…

Issue of great controversyIssue of great controversy Is it fair to export work when there are job-less Is it fair to export work when there are job-less

domestically?domestically?

Page 44: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

International IssuesInternational Issues

Computers have proven to be both good and Computers have proven to be both good and badbad Flow of information to new places every dayFlow of information to new places every day People can benefit from improved medical care, People can benefit from improved medical care,

education, etc.education, etc. Causes conflict in terms of what’s considered Causes conflict in terms of what’s considered

moralmoral Important part of the future of the world.Important part of the future of the world.

Page 45: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Computer CrimeComputer Crime

By: Robert HostBy: Robert Host

Page 46: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

IntroductionIntroduction

Rise of the internetRise of the internet The Good:The Good:

New medium for communication and businessNew medium for communication and business The Bad:The Bad:

Identity TheftIdentity Theft Peer to Peer programsPeer to Peer programs

Page 47: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Identity TheftIdentity Theft

One of the fastest growing crimes in AmericaOne of the fastest growing crimes in America Methods:Methods:

““Shoulder Surfing”Shoulder Surfing” MailMail Email hoaxesEmail hoaxes

VictimsVictims ConsumersConsumers CompaniesCompanies

Page 48: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

A brief comparison…A brief comparison…

Page 49: The Social Context of Computing Group 1. The Social Context of Computing Kyle Lippencott – Introduction to the Social Implications of computing Kyle Lippencott.

Peer to PeerPeer to Peer

““Come and get it…FREE!”Come and get it…FREE!” Napster is made and people use it to swap Napster is made and people use it to swap

music files illegally.music files illegally. Recording Industry Association of America Recording Industry Association of America

(RIAA) to the rescue!(RIAA) to the rescue! Kazaa, Morpheus, BittorentKazaa, Morpheus, Bittorent US District Court rules in favor of P2P US District Court rules in favor of P2P

programsprograms Not totally illegal, some practical applicationsNot totally illegal, some practical applications